One of the newest techniques to detect anomalies is called Isolation Forests. The algorithm is based on the fact that anomalies are data points that are few and different. As a result of these properties, anomalies are susceptible to a mechanism
This post is part of our continuing series of exploring and integrating new probabilistic tools for fraud prevention. Phishing, by definition, is the act of defrauding an online user and tricking them into clicking on a malicious link
A picture featuring Facebook founder Mark Zuckerberg appears to show tape covering the camera lens on his laptop. The move was presumably taken as a precaution against RAT, which stands for Remote Access Trojans.
Part of the problem with prediction and probability is that a lot of people don’t understand the true nature of probability. The most common misconception about probability is the problem with “causation.” This occurs when a coin is flipped and lands on heads
Companies are constantly looking for ways to streamline their business processes and ensure that legitimate customer activity is kept safe.
This article is Part 2 of our “Leveraging the Power of Email Authentication” series. Read Part 1: What is DMARC? and Part 3: Implementing DKIM. What is DKIM? Domain Keys Identified Mail (DKIM) is an email authentication mechanism that allows an email receiver
Recently, security researchers have been warning consumers about Marcher, an early Trojan for Android targeting banks.The Trojan first appeared to be affecting banking applications in Argentina, Colombia, Mexico, Peru, Chile and Brazil, but has now expanded to the United
This article is Part 1 of our “Leveraging the Power of Email Authentication” series. Read Part 2: Using DKIM to Enable DMARC and Part 3: Implementing DKIM. A business can ensure its email is accurately delivered to inboxes around the world and reject the delivery of phishing.
The much ballyhooed arrival of EMV (Chip and PIN) credit cards is now well under way, and most, if not all, major U.S. banks have already swapped out their customers' old credit cards for those with EMV chips. As background, the
Eighty thousand Kindle users. Sixty-five million Tumblr users. What do they have in common? Both groups had their login credentials breached, courtesy of hackers. While these attacks didn't directly target financial